Sciweavers

2143 search results - page 362 / 429
» corr 2010
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 22 days ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
90
Voted
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 22 days ago
The Privacy Coach: Supporting customer privacy in the Internet of Things
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase c...
Gerben Broenink, Jaap-Henk Hoepman, Christian van ...
97
Voted
CORR
2010
Springer
94views Education» more  CORR 2010»
15 years 22 days ago
Discovery of Convoys in Trajectory Databases
As mobile devices with positioning capabilities continue to proliferate, data management for so-called trajectory databases that capture the historical movements of populations of...
Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christ...
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 22 days ago
Linear Sum Capacity for Gaussian Multiple Access Channels with Feedback
The capacity region of the N-sender additive white Gaussian noise (AWGN) multiple access channel (MAC) with feedback is not known in general, despite significant contributions by C...
Ehsan Ardestanizadeh, Michele A. Wigger, Young-Han...
89
Voted
CORR
2010
Springer
96views Education» more  CORR 2010»
15 years 22 days ago
Linear Capacity Scaling in Wireless Networks: Beyond Physical Limits?
We investigate the role of cooperation in wireless networks subject to a spatial degrees of freedom limitation. To address the worst case scenario, we consider a free-space lineof-...
Ayfer Özgür, Olivier Lévêqu...